Hire the best Encryption professionals
Check out Encryption professionals with the skills you need for your next job.
- $200 hourly
- 5.0/5
- (42 jobs)
๐ TOP RATED PLUS Cybersecurity Consultant with 100% Job success rate ๐ โ Penetration Testing: Standard, Web application, mobile applications. โ Compliance: CMMC, DFARS, NIST 800-53, NIST 800-171, PCI, HIPAA, GDPR, ISO, SOC, SOX, GLBA, FedRAMP, CCPA, and more. โ Incident Response: Ransomware recovery, hacking response, forensic investigations. โ vCISO: Virtual Chief Information Security Officer โ Vulnerability Management: Vulnerability Scanning Hello, It is great to meet you (virtually)! My name is Tyler. I have over 15 years of cyber-security experience in multiple verticals. I have worked with fortune 500 brands, government, military, and intelligence agencies. ๐ I have provided expert cybersecurity and compliance consulting for startups to hundreds of businesses! ๐ My core expertise resides in: compliance and governance (PCI, HIPAA, SOC 2, NYSDFS, CMMC, DFARS, ISO, NIST, GDPR, and more), ethical hacking, incident response, penetration testing, secure design and architecture, and public speaking. I am an excellent writer and also possess business savvy. Pairing technical expertise with exemplary writing skills is my forte. I am also fluent in Brazilian Portuguese. I currently hold the following educational degrees and certifications: โ Master of Business Administration (MBA) โ Bachelor of Science in Cyber-Security โ Certified Information Systems Security Professional (CISSP) โ GIAC Certified Incident Handler (GCIH) โ GIAC Security Essentials Certification (GSEC) โ Microsoft Certified Systems Expert (MCSE) โ Microsoft Certified Systems Administrator (MCSA) โ Microsoft Certified IT Professional (MCITP) โ CompTIA Security+ โ CompTIA A+ โ CIW Web Design Associate WHY CHOOSE ME OVER OTHER FREELANCERS? -Professionalism: I treat all clients with respect and honor their trust in my services. -Expertise: I have expertise across many cybersecurity, information technology, and compliance areas. -Responsiveness: Constant and effective communication is the key to a successful engagement. -Dedication: When i take on a task or project, you deserve my undivided attention and focus! -Versatility: I can easily pivot from many different tasks. Whether your project is a standard penetration test or a Chief Information Security Officer engagement, I have the ability, knowledge, experience, and credentials to adjust based on your requirements. -I have led over 150 incident response cases. -I have brought over 75 organizations to full compliance for DFARS, NIST, PCI, HIPAA, GDPR, and more. -I have conducted over 200 penetration tests. โ I will ensure that you get the results that you deserve. My clients trust me to complete their tasks and I ALWAYS deliver! Whether you are seeking a long term partner or a short term project, I am ready to deliver the high quality results that you deserve.Encryption
Certified Information Systems Security ProfessionalHIPAADefense Federal Acquisition Regulation SupplementPolicy WritingGDPRInternet SecuritySecurity AnalysisInformation SecuritySecurity Assessment & TestingApplication SecurityIncident Response PlanVulnerability AssessmentNetwork SecurityPenetration Testing - $150 hourly
- 5.0/5
- (13 jobs)
x86, x64, ARM, disassembly, decompilation. Using IDA, Ghidra, Binary Ninja, Frida, Sniffers and other. Desktop, mobile, Android, APK, drivers, firmware, encryption/decryption. File formats, protocols, unpackers, data extraction. Researching binaries, obfuscation.Encryption
Visual BasicDelphiData ExtractionSoftware DebuggingEmbedded SystemAssemblerApplication SecurityReverse EngineeringAssembly LanguageC++C#HEXX86 Assembly Language - $50 hourly
- 5.0/5
- (41 jobs)
Web Development, Desktop Development, Android Development, Database System Management Development, API and Cloud Sevices.Encryption
Reverse EngineeringNext.jsNode.jsElectronTypeScriptAndroidJavaScriptAPI IntegrationData ScrapingSQLData MiningPython - $250 hourly
- 4.7/5
- (28 jobs)
Possess an innate flair of executing research projects in the field of Network Security, Explainable AI, AI/ML, Blockchain, Cognitive Radio, Machine Reading Comprehension, Agent Based Modelling, Project Management and Cryptography. Logical thinker and strong communicator with noted success of 80+ international publications in IEEE, Springer, Elsevier including books, book chapters, journals and conference papers, 4 patents and 3 million INR funding in Grants. She has 600+ citation count, h-index of 12 and i-10 index of 12 in Google Scholar and 500+ citation count, h-index 11 in Scopus. Editor of 4 Springer books and 1 International journal of Bentham Science Publisher (Scopus indexed). Excellence in driving the development & implementation of objectives for curriculum and instructional evaluation; hiring quality faculty and generating National Grants, establishing Industrial and Foreign collaborations. Impeccable record of e-learning content development and delivering talks on network security, sensor network, DNA cryptography, information theory, organizing international workshops, seminars, conferences on futuristic skills related to Cyber Security and Network Security in collaboration with professional organizations as well as workshops on Pedagogy for Indian Engineering institutions.Encryption
Internet of ThingsLinuxCurriculum DevelopmentWhite Paper WritingData Science ConsultationCryptographyArtificial Neural NetworkEthical HackingBlockchainComputing & NetworkingResearch PapersTraining Online LMSTechnical WritingNetwork Security - $99 hourly
- 4.8/5
- (45 jobs)
I have +15 years of Professional Reverse Engineering, Cybersecurity Expertise and Digital forensic evidence expertise. I specialize in Android Reverse Engineering, iOS Reverse Engineering, Windows and embedded systems, extracting/monitoring, analyzing and decompiling applications, firmware and network traffic. โข Android Reverse Engineering (APK/DEX/ELF), โข iOS Reverse Engineering (IPA/Mach-O) โข Full Reverse Engineering for Windows (EXE/DLL) applications. โข Smali, ARM and x86/x64 Build Analysis for deep code level understanding and patching. โข APK/IPA Build and source code refactoring including binary patching and feature change. โข Network Traffic Capture and SSL Pinning Bypass enable live traffic analysis and API extraction. โข Firmware Reverse Engineering for IoT, ECU and embedded devices (including BLE protocols like BLE 4/5 Coded PHY). โข Software Analysis using industry standard tools like IDA Pro, Ghidra and x64dbg โข Development of Deobfuscation, Custom Plugins and Scripts. โข Reverse Engineering and Modification of Native Android Libraries (.so files) including advanced linking and patching. โข Cryptographic Analysis and Key/Algorithm Extraction from compiled binaries. โข API Extraction and Documentation from obfuscated mobile applications. โข Development of Automated Reverse Engineering Tools to accelerate repetitive tasks. โข Browser Automation and Web Data Extraction via custom Selenium, Puppeteer and Multilogin setups. โข End-to-end security solutions in Cyber โโSecurity including threat detection, incident response and security architecture design โข Professional ethical hacking and security assessment services. โข Uncovering digital evidence through comprehensive computer, mobile, memory and network forensics. After 10 years of working in a high security R&D environment as a cyber operations team leader and on vulnerability research projects, I have developed deep expertise in analyzing complex software structures, identifying obfuscation layers, bypassing advanced protections and encryption mechanisms and reverse engineering.Encryption
Penetration TestingVulnerability AssessmentEthical HackingInternet SecurityCryptographySecurity EngineeringPythonFirmwareiOSAndroid App DevelopmentAndroidAssembly LanguageInformation SecurityReverse Engineering - $35 hourly
- 5.0/5
- (515 jobs)
Certifications that I hold: CEH ( Certified Ethical Hacker) 740 MCSA ( Installation, Storage and Compute with Windows Server 2016) To whom it may concern, In the last years I did more than 500 Penetration Tests and Security Assessments , a real deal. Most of them on Web and Mobile ( Android and iOS ) applications with Finance Background implemented with various technologies and frameworks, server security testing and hardening. Sample reports can be provided who is interested. Prompt responses to your needs. You can consider me as and internal staff of your company , always helping you to do the best in security. --------------------------------------------------------------------- Phishing simulation for your company needs ___________________________________________________________ Professional Load and Stress Testing if you are interested for your application __________________________________________________________Encryption
Security EngineeringWeb Application SecurityInternet SecurityNIST SP 800-53Windows ServerOWASPEthical HackingManual TestingSecurity InfrastructureNetwork SecurityPenetration TestingApplication SecurityKali LinuxVulnerability AssessmentSecurity Assessment & Testing - $30 hourly
- 4.9/5
- (101 jobs)
Machine Learning, AI, Custom agents, Chemo/Biophysics Biotech AI Chatbots for web and mobile QA machines Drug discovery AI NLP/CV Custom AI agents/ Langchain/ Autogen System administration/networking Bioinformatics, chemoinformatics, AI Biotech and medical software development, Machine Learning /// Cybersecurity, Deep Learning: Project management - Biotech Team leading - Scientific computing, Medical research OSINT/ VA work Information security Crypto/Blockchain Deep Learning, Scientific computation ////Encryption
Ethical HackingInformation Security AuditBiomedical EngineeringBioinformaticsDrug DiscoveryProject ManagementInformation SecurityMedical InformaticsBiotechnologyArtificial IntelligenceChatGPTPythonChatbotTechnical SupportMachine Learning - $40 hourly
- 4.9/5
- (96 jobs)
I am ISO27001 certified cyber security expert with over 10 years of experience in desktop application development and cyber security. I love taking up challenges that may seem impossible to many, for all types of systems. My main expertise is bypassing defence (antiviruses/firewalls/EDR), removing false positive detections on virustotal, Malware development, web application hacking, penetration testing, API hacking, breaking application security, decompiling, reversing, scam/hacking/blackmail incident research, malware research, Desktop Application Development in C/C++/C# .NET/Python System Security Audits / Malware Cleaning/ System Hardening / System Forensics, bypassing AVs, evasion, injection through latest techniques Technical report writing / Technical Consultation and Analysis (Related to Cyber security)Encryption
Virus RemovalWritingPenetration TestingSecurity Assessment & TestingSecurity AnalysisDesktop ApplicationArticle WritingInformation SecuritySystem SecuritySecurity TestingApplication SecurityEthical HackingWindows App DevelopmentC#C++ - $125 hourly
- 5.0/5
- (737 jobs)
Hello! I'm Tristan Curtis, a Top Rated IT Professional / Sr. Software Engineer with a passion for helping people with their technical needs. Backed with a degree in Information and Network Technology, accompanied by multiple certifications, and strengthened by extensive hands-on experience, I am well-equipped to tackle virtually any challenge you throw my way! Understanding the need for prompt assistance, I strive to be available within a moments notice, day or night. I offer a wide array of services including, but not limited to Web Application Development โช๏ธ Backend: PHP, Laravel โช๏ธ Frontend: Vue.js, JavaScript, jQuery, HTML, CSS, Sass, Bootstrap โช๏ธ Databases: MySQL, SQL Server, MariaDB, PostgreSQL โช๏ธ Specializes in: architecting complex web applications from scratch based on a provided design Web Administration โช๏ธ Domain and DNS support โช๏ธ Troubleshooting issues with Nginx, Apache and WHM/cPanel โช๏ธ Fine-tuning PHP FPM for optimal scalability โช๏ธ Installing SSL certificates and addressing renewal issues with LetsEncrypt / Certbot โช๏ธ Migrating websites from one hosting company to another Network Administration โช๏ธ Proficient in managing networks powered by the following vendors: UniFi, pfSense, MikroTik, Cisco โช๏ธ Expertise in deploying and troubleshooting wireless connectivity โช๏ธ Strong knowledge of VPN connectivity for remote access and site-to-site connections โช๏ธ Experience developing custom splash pages / captive portals to authorize wireless connections Desktop Administration โช๏ธ Experience with the following operating systems: Windows, Mac OS, Ubuntu and various other Linux distros โช๏ธ Virtual desktop administration utilizing VMware Horizon Database Administration โช๏ธ Experience with: MySQL, MS SQL Server, MariaDB and PostgreSQL โช๏ธ Familiarity with: Google Cloud SQL and AWS RDS Virtual Infrastructure Administration โช๏ธ Proficient in VMware ESXI/VMware vCenter and Hyper-V Email Administration โช๏ธ Setting up SPF, DKIM and DMARC for enhanced email security โช๏ธ Troubleshooting email deliverability issues โช๏ธ Seamless migration of email from one platform to another โช๏ธ Well versed in Google Workspace and Office 365Encryption
VMware AdministrationData MigrationEmail DeliverabilityWeb HostingTwilio APIDomain MigrationMySQLNetwork AdministrationLaravelSSLPHPUbiquitiDNSSystem Administration - $35 hourly
- 5.0/5
- (52 jobs)
โ JAVA โ Spring โ Thymeleaf โ Rest API I am a solutions provider, share with me your requirements and I will give you a complete solution, front-end to back-end. I'll take care of the whole building process. You just sit, drink a beer and enjoy your app I have experience working as a developer, team leader, and project manager. As a developer I make modular, clean, object-oriented and well-commented code, always aiming quality and intelligence in the solutions. My solutions are complete, front-end to back-end. I have experience with: java, swing, J2EE mobile development (android - java native) spring boot, spring MVC, spring roo,spring-security, spring data, thymeleaf ... HTML, CSS,javascript,angular SQL databases like MySQL, PGSQL, SQL server and ORACLE NoSQL databases like MongoDB, Cassandra JPA, hibernate elasticsearch, kibana, Redis maven, Gradle, GIT, Jira, Jenkins, docker, kubernetes ๐ WHY CHOOSE ME OVER OTHER FREELANCERS? ๐ โ Client Reviews: I focus on providing VALUE to all of my Clients and Earning their TRUST. The Client Reviews and Feedback on my Profile are immensely important to me and the value that I provide. โ Over-Delivering: This is core to my work as a Freelancer. My focus is on GIVING more than what I expect to RECEIVE. I take pride in leaving all of my Clients saying "WOW" โ Responsiveness: Being extremely responsive and keeping all lines of communication readily open with my Clients. โ Resilience: Reach out to any of my Current of Former Clients and ask them about my Resilience. Any issue that my Clients face, I attack them and find a SOLUTION. โ Kindness: One of the biggest aspects of my life that I implement in every facet of my life. Treating everyone with respect, understanding all situations, and genuinely wanting to IMPROVE my Client's situations. I am eager to work with you, to provide reliable, consistent, and High-Level solutions to design/development challenges. Please contact me, so we can discuss how we can work together to FULLY meet your Business Needs!Encryption
MySQL ProgrammingContainerApplication SecurityHTMLCSSAmazon Web ServicesDockerKubernetesSpring DataRESTful APIAPI IntegrationHibernateSpring BootJavaJava Persistence API - $60 hourly
- 4.6/5
- (17 jobs)
โพCryptography โพ C/C++, Python, Bash Scripting โพInformation security โพ Reverse Engineering โพ Malware Analysis โพ Network Security โพ Research and Development (Research Paper) โพ Information security Article writing โพ Academic assignments and problem solving โพ Cryptology +โช๏ธEncryption +โช๏ธPKI +โช๏ธPost Quantum Cryptography(PQC) +โช๏ธMulti-Party Computation(MPC) +โช๏ธDigital Signature and Certificates +โช๏ธAuthentication and Identification +โช๏ธHash Functions +โช๏ธProtocols and mechanism +โช๏ธKey Establishment and Management +โช๏ธZero Knowldge Proof +โช๏ธECCEncryption
Security AnalysisLinuxAcademic ResearchPenetration TestingReverse EngineeringFPGAXilinxVerilogCUDAPythonC++CInformation SecurityCryptography - $28 hourly
- 5.0/5
- (33 jobs)
I am passionate about automating everything. Very interested in integrating various technology pieces. Love Javascript, ETL, Web hosting, Docker, Traefik, AWS, Python. Works with various teams spreads across the global timing. โ Container Technology : Docker, Kubernetes, ECS. โ Cloud Technology : AWS, Digital Ocean, Azure. โ Programming Language : Python, Shell Scripting, JavaScript โ AWS Services : S3, Lambda, Cloudfront, ECS, Fargate, Glue, Athena, EC2, IAM. Data Integration projects and related work โ Worked on Mirth Connect for past 6 years with various healthcare integrations. โ Integrated EPIC Patient facing app โ Integrated Sure Script secure messaging โ Worked on various PM/EMR/EHR integration like - Athena, Modmed, AdvancedMD, Nextgen, Nexttech. โ AWS HIPPAA environment setup and maintenance. โ HL7v2.x - SIU, ADT, DFT bidirectional integration. โ EDI X12 - 837, 850, 855, 810. DevOps Projects and Work โ Developed an auto scheduler Lambda function to turn on/off EC2 at scheduled time. โ OpenVPN setup. โ Upgrading EBS size, types, EC2 type, AMI, configuring various Cloudfront alerts like EBS size โ alerts, EC2 CPU alerts, Billing alerts. โ Configuring VPC with private and public accessible resource configurations. โ Run AWS Security Hub, analyze report and fix issues by severity level. โ Worked on compliance checklist for PCI, HIPAA. โ IAM creating users, enabling Multi-Factor Authentication (MFA) for users, user permissions, โ creating roles, policies and groups.Encryption
OCR SoftwareData EngineeringMirth ConnectHealth Level 7Apache NiFiAutomationDevOpsdbtAWS LambdaFHIRPDFData Warehousing & ETL SoftwareServerless StackHealthcare ITLinuxData ExtractionPython - $150 hourly
- 4.8/5
- (12 jobs)
PKI Security products and solutions related Cryptography, PKCS#11, HSM, Smart Card, Multi-factor Authentication, OTP Authentication, Bio-metric authentication, Application Security, Encryption, Digital Signature, CSP, Credential Provider, solution conforming to NIST FIPS-140 level 2/3 certification, PIV, CAC, Entrust, Id-entrust, CMS solutions, MS Identity life cycle Manager, Minidriver, SSL and VPN integration, Various Identity access control and management solutions, PDF Signing on Mobile, Remote PDF signing, Personalization of NFC mifare Classic 1K and 4Ksmart card, Access authentications, Worked on solutions targeted for Desktop (Windows, Linux, Mac), Embedded Software, IOT Device solutions, Android Native Development, Cloud solutions, - Languages*:: C, C++, Java, QT, C# ,Python,Javascript, TypeScript - Operating System:: Windows, Android,vxWorks, Linux, Embedded Linux - Tools:: GCC, GDB,LLVM, LLD, Android Studio, Shell scripting, Eclipse, Visual Studio - Standards/ API:: PKCS # 11, #12 , MS CAPI, Credential Provider, TokenD, KeyChain APIs, ISO - 7816, Bluetooth / Bluetooth LE APIs, FIPS-140 level 2 & 3, KMIP specification, FIDO specifications, PCSC lite, EMV specification, Master/Visa, ANSI Standard for key exchanges, TR31 and TR34 Key blocks, PIN, PCI DSS, CCSS level 3, - OpenSource:: OpenSSL, OpenSSH, BouncyCastle (FIPS/Non-Fips) - Web Technologies:: NodeJS, Protobuffer, DJanfo, Angular, HTML, CSS, React.js, Next.js, XML, WS security - HSM: IBM CloudHSM, AWS-CloudHSM, Google Cloud HSM, Azure Cloud HSM, Thales DPoD, Thales Luna HSM, AWS-KMS, Payment HSMs, SafeNet CloudHSM, DPoD, SoftHSM, AWS Payment Cryptography, nShiled, CiperTrust, Utimaco, - Blockchain: Bitcoin and Ethereum signing with CloudHSM, BIP32 Signing, secp256k1 signing, Ethereum Signer with CloudHSM.Encryption
OAuthWindows API DevelopmentBlockchain, NFT & CryptocurrencyC++JavaJavaScriptReverse EngineeringNFCCAndroidPythonCryptographyApplication SecurityInformation SecurityLinuxElliptic Curve Cryptography - $140 hourly
- 5.0/5
- (84 jobs)
โ ๐ญ๐ฑ+ ๐๐ฒ๐ฎ๐ฟ๐ ๐ฒ๐ ๐ฝ๐ฒ๐ฟ๐ถ๐ฒ๐ป๐ฐ๐ฒ๐ฑ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐๐๐ฟ๐ฒ | ๐ข๐ณ๐ณ๐ถ๐ฐ๐ฒ ๐ฏ๐ฒ๐ฑ | ๐ช๐ถ๐ป๐ฑ๐ผ๐๐ ๐ง๐ฒ๐ฐ๐ต๐ป๐ถ๐ฐ๐ฎ๐น ๐๐ผ๐ป๐๐๐น๐๐ฎ๐ป๐/๐๐ฟ๐ฐ๐ต๐ถ๐๐ฒ๐ฐ๐ ๐๐ถ๐๐ต ๐ฐ๐น๐ถ๐ฒ๐ป๐๐ ๐๐ฝ๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ฃ๐๐ฏ๐น๐ถ๐ฐ ๐ฆ๐ฒ๐ฐ๐๐ผ๐ฟ, ๐๐ฎ๐ป๐ธ๐ถ๐ป๐ด, ๐๐ป๐ฒ๐ฟ๐ด๐, ๐ก๐๐ข, ๐ฅ๐ฒ๐๐ฎ๐ถ๐น, ๐ง๐ฒ๐น๐ฐ๐ผ, ๐ ๐ฆ๐ฃ, ๐ฎ๐ป๐ฑ ๐๐ฑ๐๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐๐ฒ๐ฐ๐๐ผ๐ฟ๐. โ ๐ญ๐ฌ+ ๐ ๐ถ๐น๐น๐ถ๐ผ๐ป $ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐ฐ๐ฎ๐น ๐ฐ๐ผ๐ป๐๐ฟ๐ฎ๐ฐ๐๐ ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐ท๐ฒ๐ฐ๐๐ ๐ฑ๐ฒ๐๐ถ๐ด๐ป๐ฒ๐ฑ, ๐ถ๐บ๐ฝ๐น๐ฒ๐บ๐ฒ๐ป๐๐ฒ๐ฑ, ๐ฎ๐ป๐ฑ ๐ค๐โ๐ฒ๐ฑ. "๐๐ฎ๐ช๐ณ ๐ธ๐ข๐ด ๐ฆ๐น๐ฑ๐ฆ๐ณ๐ต ๐ช๐ฏ ๐ต๐ฉ๐ช๐ด ๐ธ๐ฐ๐ณ๐ฌ. ๐๐ฐ๐ฎ๐ฎ๐ถ๐ฏ๐ช๐ค๐ข๐ต๐ช๐ฐ๐ฏ ๐ธ๐ข๐ด ๐ฆ๐น๐ค๐ฆ๐ญ๐ญ๐ฆ๐ฏ๐ต. ๐๐ฆ ๐ธ๐ข๐ด ๐ข๐ญ๐ธ๐ข๐บ๐ด ๐ฑ๐ถ๐ฏ๐ค๐ต๐ถ๐ข๐ญ ๐ข๐ฏ๐ฅ ๐ฆ๐ง๐ง๐ช๐ค๐ช๐ฆ๐ฏ๐ต. ๐๐ช๐ด ๐ข๐ฑ๐ฑ๐ณ๐ฐ๐ข๐ค๐ฉ ๐ธ๐ข๐ด ๐ค๐ข๐ญ๐ฎ, ๐ณ๐ข๐ต๐ช๐ฐ๐ฏ๐ข๐ญ, ๐ง๐ณ๐ช๐ฆ๐ฏ๐ฅ๐ญ๐บ, ๐ฉ๐ฆ๐ญ๐ฑ๐ง๐ถ๐ญ ๐ข๐ฏ๐ฅ ๐ฑ๐ณ๐ฐ๐ข๐ค๐ต๐ช๐ท๐ฆ. ๐๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ธ๐ช๐ต๐ฉ ๐๐ฎ๐ช๐ณ ๐ธ๐ข๐ด ๐ข ๐ฑ๐ญ๐ฆ๐ข๐ด๐ถ๐ณ๐ฆ. ๐๐ฆ ๐ข๐ณ๐ฆ ๐ญ๐ฐ๐ฐ๐ฌ๐ช๐ฏ๐จ ๐ง๐ฐ๐ณ๐ธ๐ข๐ณ๐ฅ ๐ต๐ฐ ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ข๐จ๐ข๐ช๐ฏ ๐ธ๐ช๐ต๐ฉ ๐๐ฎ๐ช๐ณ ๐ช๐ฏ ๐ต๐ฉ๐ฆ ๐ฏ๐ฆ๐ข๐ณ ๐ง๐ถ๐ต๐ถ๐ณ๐ฆ ๐ข๐ด ๐ฉ๐ฆ ๐ฉ๐ข๐ด ๐ฑ๐ณ๐ฐ๐ท๐ฆ๐ฏ ๐ต๐ฐ ๐ฃ๐ฆ ๐ข๐ฏ ๐ช๐ฏ๐ท๐ข๐ญ๐ถ๐ข๐ฃ๐ญ๐ฆ ๐ด๐ถ๐ฑ๐ฑ๐ฐ๐ณ๐ต ๐ต๐ฐ ๐ถ๐ด ๐ข๐ฏ๐ฅ ๐ฉ๐ช๐ด ๐ธ๐ข๐บ ๐ฐ๐ง ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ช๐ด ๐ฐ๐ง ๐ต๐ฉ๐ฆ ๐ฉ๐ช๐จ๐ฉ๐ฆ๐ด๐ต ๐ฑ๐ณ๐ฐ๐ง๐ฆ๐ด๐ด๐ช๐ฐ๐ฏ๐ข๐ญ ๐ฒ๐ถ๐ข๐ญ๐ช๐ต๐บ. ๐๐ฉ๐ข๐ฏ๐ฌ ๐บ๐ฐ๐ถ ๐๐ฎ๐ช๐ณ ๐ง๐ฐ๐ณ ๐ข๐ญ๐ญ ๐บ๐ฐ๐ถ๐ณ ๐ธ๐ฐ๐ณ๐ฌ ๐ข๐ฏ๐ฅ ๐ง๐ฐ๐ณ ๐ต๐ฉ๐ฆ ๐ธ๐ข๐บ ๐ช๐ฏ ๐ธ๐ฉ๐ช๐ค๐ฉ ๐บ๐ฐ๐ถ ๐ฎ๐ข๐ฅ๐ฆ ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ธ๐ช๐ต๐ฉ ๐บ๐ฐ๐ถ ๐ต๐ฐ ๐ฃ๐ฆ ๐ข ๐ฑ๐ญ๐ฆ๐ข๐ด๐ถ๐ณ๐ฆ." โ Experienced in planning, deploying, securing, and troubleshooting Google SSO and Okta technologies โ Experienced in security assessments, best practices, well-architected framework, cost optimizations of Microsoft workloads. Examples including ACSC Essential Eight and HIPAA. โ Experienced in designing and building Active Directory tiering structure, Privileged Access Workstations (PAW), hardening Active Directory Group Policy Objects (GPO), Intune security policies โ Experienced in planning, deploying, migrating, securing, and troubleshooting the following technologies โ๏ธAzure (App Services, VMs, networking, security, storage, etc.) โ๏ธMicrosoft 365 โ๏ธEntra ID (formerly Azure AD) โ๏ธEntra Internet Access and Private Access โ๏ธAzure Migrate (Physical, Hyper-V, VMware, etc.) โ๏ธIntune โ๏ธSQL Server (High Availability, TDE, and Security lockdown) โ๏ธAlways-On VPN (Azure AD-joined, Hybrid-joined, SCEP, etc.) โ๏ธActive Directory Certificate Services (ADCS) PKI โ๏ธData Loss Prevention (DLP) โ๏ธMicrosoft Sentinel โ๏ธAzure Governance โ๏ธAzure Policy โ๏ธWindows 10 โ๏ธMicrosoft Defender for Cloud โ๏ธMicrosoft Defender for Identity โ๏ธMicrosoft Defender for Endpoint โ๏ธMicrosoft Defender for Cloud Apps โ๏ธSystem Center Configuration Manager (SCCM) โ๏ธSystem Center Virtual Machine Manager (SCVMM) โ๏ธPowerShell โ๏ธSCIM Provisioning and Single Sign-On (SSO) โ๏ธAzure Virtual Desktop โ๏ธActive Directory Domain Services (ADDS) โ๏ธActive Directory Federation Services (ADFS) โ๏ธAzure Information Protection (AIP) โ๏ธHyper-V โ๏ธExchange Online/Exchange Server โ๏ธTeams/Office Communications Server/Lync Server/ Skype for Business Server โ๏ธDigicert CertCentral (SSL certificate lifecycle automation) โ๏ธNerdio โ๏ธBarracuda Message Archiver โ๏ธBarracuda Email Gateway Defense (formerly Email Security) โ๏ธCrowdStrike (remove and uninstall due to update BSOD issue) โ๏ธKaspersky Security Center โ๏ธSymantec Endpoint Protection Manager โ๏ธMcAfee Endpoint Protection (ePO) โ๏ธUnifi UDM Pro โฑSaving deployment time and man-hours and focusing on quality of delivery "๐๐ฎ๐ช๐ณ ๐ช๐ด ๐ฐ๐ฏ๐ฆ ๐ฐ๐ง ๐ต๐ฉ๐ฆ ๐ฎ๐ฐ๐ด๐ต ๐ฅ๐ฆ๐ฅ๐ช๐ค๐ข๐ต๐ฆ๐ฅ, ๐ฉ๐ข๐ณ๐ฅ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ข๐ฏ๐ฅ ๐ช๐ฏ๐ฏ๐ฐ๐ท๐ข๐ต๐ช๐ท๐ฆ ๐ฑ๐ฆ๐ฐ๐ฑ๐ญ๐ฆ ๐โ๐ท๐ฆ ๐ฉ๐ข๐ฅ ๐ต๐ฉ๐ฆ ๐ฑ๐ญ๐ฆ๐ข๐ด๐ถ๐ณ๐ฆ ๐ฐ๐ง ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ธ๐ช๐ต๐ฉ. ๐๐ฎ๐ช๐ณ ๐ข๐ญ๐ธ๐ข๐บ๐ด ๐จ๐ฐ๐ฆ๐ด ๐ข๐ฃ๐ฐ๐ท๐ฆ ๐ข๐ฏ๐ฅ ๐ฃ๐ฆ๐บ๐ฐ๐ฏ๐ฅ ๐ต๐ฐ ๐ง๐ช๐ฏ๐ข๐ญ๐ช๐ป๐ฆ ๐ช๐ฎ๐ฑ๐ญ๐ฆ๐ฎ๐ฆ๐ฏ๐ต๐ข๐ต๐ช๐ฐ๐ฏ ๐ข๐ฏ๐ฅ ๐ฆ๐ฏ๐ด๐ถ๐ณ๐ฆ ๐ข ๐ด๐ถ๐ค๐ค๐ฆ๐ด๐ด๐ง๐ถ๐ญ ๐ค๐ฐ๐ฎ๐ฑ๐ญ๐ฆ๐ต๐ช๐ฐ๐ฏ. ๐๐ฎ๐ช๐ณ ๐ช๐ด ๐ต๐ฉ๐ฆ ๐ต๐บ๐ฑ๐ฆ ๐ฐ๐ง ๐ฑ๐ฆ๐ณ๐ด๐ฐ๐ฏ ๐บ๐ฐ๐ถ ๐ค๐ข๐ฏ ๐ค๐ฐ๐ถ๐ฏ๐ต ๐ฐ๐ฏ ๐ข๐ฏ๐ฅ ๐ฉ๐ช๐ด ๐ฑ๐ฐ๐ด๐ช๐ต๐ช๐ท๐ฆ ๐ข๐ต๐ต๐ช๐ต๐ถ๐ฅ๐ฆ ๐ช๐ด ๐ค๐ฐ๐ฏ๐ต๐ข๐จ๐ช๐ฐ๐ถ๐ด. ๐ ๐ธ๐ฐ๐ถ๐ญ๐ฅ ๐ฉ๐ช๐จ๐ฉ๐ญ๐บ ๐ณ๐ฆ๐ค๐ฐ๐ฎ๐ฎ๐ฆ๐ฏ๐ฅ ๐ฉ๐ช๐ฎ ๐ฅ๐ถ๐ฆ ๐ต๐ฐ ๐ฉ๐ช๐ด ๐ฆ๐น๐ฑ๐ฆ๐ณ๐ต๐ช๐ด๐ฆ ๐ช๐ฏ ๐ต๐ฉ๐ฆ ๐ง๐ช๐ฆ๐ญ๐ฅ ๐ฐ๐ง ๐ฆ๐ฎ๐ข๐ช๐ญ ๐ฅ๐ฆ๐ญ๐ช๐ท๐ฆ๐ณ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐บ."Encryption
IT InfrastructureVirtualizationMicrosoft Exchange OnlineAzure App ServiceEmail DeliverabilitySSL CertificateSingle Sign-OnMicrosoft Active DirectoryAutomationMicrosoft Endpoint ManagerWindows ServerDNSMicrosoft AzureOffice 365Microsoft IIS - $150 hourly
- 5.0/5
- (38 jobs)
I specialize in Cybersecurity, threat mitigation (hacking cleanup and repair) and system administration on a enterprise scale, as well as full stack development. Complete, integrated and reliable solutions to the most challenging and unique business IT needs, no matter the complexity or difficulty. Fluent in PHP, HTML, JavaScript, Node, and several other programming languages. Experienced Network architect Cybersecurity preventative monitoring and protection, threat detection, and response Cloud Infrastructure management, consulting, and deployment Web & Database migration, management and repair I am your complete IT solutions provider, with over 5+ years of experience!Encryption
Security Assessment & TestingSystem AdministrationVulnerability AssessmentSecurity EngineeringCloud SecurityMalware RemovalCloud ManagementCloud ArchitectureSecurity InfrastructureIT ConsultationInformation SecuritySystem HardeningDevOpsPHPWordPress - $190 hourly
- 4.9/5
- (507 jobs)
Based on my 30 years of experience in the field of IT, i am able to complete complex tasks of high difficulty. Working in international corporations allowed me to have a practice with productive and expensive systems. Contracts in the banking sector has taught confidentiality and responsibility and the importance of trust. My main qualification is in system administration. From the direct assembly of the server to the configuration of the operating system. Therefore i have expert knowledge of operation systems Windows\UNIX. Server OS: Microsoft Windows server, RedHat, Ubuntu, CentOS, PopOS, Debian, other Linux.. Cloud: Amazon Web Services AWS, Google cloud GCP, Oracle cloud, Microsoft Azure, IBM cloud.. Hosters: Digital Ocean, Hetzner.. Virtualization: Hyper-V, VMWare, VirtualBox, KVM, Proxmox.. Emergency problem resolving. Web, VPN, VPS, Cloud, Virtualization. Hardware troubleshoting and repair. Security networking. Infrastructure protection. BIOS\FW recovering, updating.Encryption
Postfix SMTP ServerMicrosoft Hyper-V ServerSystem ConfigurationVirtualizationAmazon EC2Data RecoveryDisaster RecoveryVirtual Private ServerHardware TroubleshootingLinux System AdministrationSystem AdministrationServer VirtualizationWindows Server - $30 hourly
- 5.0/5
- (98 jobs)
Consolidating my past involvement in Ethical Hacking, Incident Response, IT Security Governance, and Project Management with solid relational and correspondence capacities, I am sure that I can give work that will surpass your desires. Security Analyst with 10+ years' experience in Endpoint security, Application Security, Change Management, Exception Handling and VAPT. Experience in system and network administration, managing server infrastructures and data center operations. Expert-level knowledge of Amazon EC2, S3, Simple DB, RDS, Elastic Load Balancing, SQS, and other services in the AWS cloud infrastructure such as IAAS, PAAS and SAAS. Deep experience with AWS components such as EC2, S3, Elastic IPs, EBS, Security Groups, Route 53, VPC, Elastic Beanstalk, RDS, DynamoDB, and Cloud Formation. Experience in administration of MS SQL server and MySQL in AWS cloud platform. Configured AWS IAM and Security Group in Public and Private Subnets in VPC. Architected, Designed and Developed the Backup and Archiving, Disaster Recovery in AWS Cloud. Security Tools: Nessus, Nmap, burp suite, Wire shark, Web scarab. Operating Systems & Platform: Kali Linux, Backtrack 5 r3, Windows 7, 8, 8.1,10, MAC. Programming Language: HTML, JavaScript. Framework: Metasploit, OWASP. Endpoint: Sophos, Check Point. Amazon Web Services: Ec2, EBS, IAM, VPC, RDS Azure: VNET, VM (Windows, Linux) Server: Windows 2008 server, windows 2012 server.Encryption
Information Security ConsultationSecurity InfrastructureSecurity Assessment & TestingWeb App Penetration TestingInformation SecurityAmazon Web ServicesPenetration TestingSecurity AnalysisApplication SecurityVulnerability AssessmentSecurity TestingMicrosoft AzureKali LinuxCloudflare - $50 hourly
- 4.9/5
- (95 jobs)
โ Starting from Elance.com my team has earned more than $8M. โ As you can see from my job record I'm a trusted Coca-Cola Talent Cloud development provider. โ Plenty of massive projects accomplished and successfully launched with my 10 years record in IT. โ Team-Leader = Team-Player โ I have surrounded myself with talented and passionate engineers to bring you a dream-team โ AI Research Laboratory We offer deep expertise in the following areas: ๐น Mobile app development ๐น AI app development ๐น Web development ๐น UX/UI design ๐น QA Testing testing the software for problems before it goes live ๐น Discovery business analysis, tech stack choice and project planning ๐น UX Audit Improving user engagement and conversion ๐น IoT app development ๐น 3rd Party API Integrations ๐น DevOps ๐ Don't hesitate to invite me at least for the best consulting Mobile App Development: Framework: Flutter with Dart for cross-platform mobile development. Front-end and Back-end: Flutter Widgets for UI, Firebase for real-time databases and hosting, RESTful API integration. Design and Testing: Proficient in UI/UX design with Material Design widgets, unit and widget testing for quality assurance. DevOps and Version Control: Familiarity with Git for version control, and CI/CD tools for efficient deployment.Encryption
InfographicArtificial IntelligenceWordPressMachine LearningAndroid App DevelopmentiOS DevelopmentIonic FrameworkNode.jsPHPAngularJSAmazon Web Services - $165 hourly
- 5.0/5
- (34 jobs)
Sr. Architect and Engineer specializing in Cybersecurity, Networks, Cloud, and IT Systems with proven international business experience and management skills. UPWORK experience: 9000+ work hours, 100% Job Success, Top Rated Plus, Expert-Vetted. With 15+ years of professional experience, I provide a complete set of services from proven advanced technical solutions and methodologies to business development, team-building, and management. I have successfully delivered complex projects across heterogeneous environments such as Telco/ISP providers, SMB, and Large International Enterprises in USA, Europe & Globally. Main offered services include: โข Cybersecurity Architect โข Network Architect โข System Architect โข Cloud Architect โข Digital transformation โข Solution design and implementation โข IT strategy development โข Information Security Manager โข vCTO | vCIO | vCISO โข Executive Consultant Highly experienced SME in the following technology fields: Information Security & Cyber Security โข Develop & enhance Cybersecurity management frameworks. โข Develop, implement & monitor strategic, comprehensive enterprise information security & IT risk management programs. โข Develop, and maintain cybersecurity policies, standards, baselines, guidelines, and procedures. Network/IT/System Security โข Firewall, UTM, NGFW & NG-IPS protection: Fortigate, FortiManager, FortiAnalyzer, Cisco (ASA FirePower), Barracuda, pfSense, Checkpoint, PaloAlto, SonicWall, WatchGuard โข Email Security: Cisco, Barracuda, Mimecast, Microsoft โข Web Security: Cisco, Barracuda, Fortinet, McAfee, Zscaler โข Proxy and Reverse Proxy: Squid, Nginx, Dante โข IPSec VPN & SDWAN: Cisco DMVPN, HPE ADVPN, Fortigate ADVPN โข SSL VPN: Fortigate, Cisco, PaloAlto, Barracuda, SonicWall, OpenVPN, pfSense, Swan, OpenConnect โข Network Access Control (802.1X, Radius, Tacacs+โฆ), BYOD and MDM : Aruba ClearPass, Cisco ISE, PacketFence, NPS, Genians, Intune... โข ZTNA Expert with all leading multi-vendor solutions โข IAM SSO SAML2 Oauth: OKTA, Keycloack, Auth0 โข DLP & CASB Bitglass, Forcepoint โข EDR McAfee, Sophos, SentinelOne... โข SIEM and SOC solutions - Wazuh, Fortinet, Splunk... IT Cloud/Systems/Virtualization/Backup/DR โข Hybrid Cloud, Multi Cloud Architecture โข Cloud Infrastructure Security, Networking, Storage, VPC (AWS, Azure, OVH, OpenStack...) โข Virtualization planning, implementation, tuning (VMware, Proxmox, KVM, Hyper-V) โข Hyperconverged HCI solutions ESXi & vSAN, Proxmox & CEPH โข Linux Systems deployment, administration and development (Debian Ubuntu OpenSuSE CentOS RedHat) including performance optimization, hardening, scripting, HA, backup & restore โข Windows Server architecture & administration (Hyper-V AD GPO DNS DHCP PKI File Server ...) โข SAN (FC/FCoE), ISCSi, NAS(File) โข VDI and Virtual App (Microsoft, VMware, Citrix) โข Load Balancer/Application Delivery: HAproxy, Nginx, Barracuda, F5 โข ElasticSearch & OpenSearch design & implementation โข Critical HA Database clusters: PostgreSQL & MySQL โข HA, Backup & Disaster Recovery planning & deployment (Veeam, VMware, Proxmox, Linux, AWS, Azure, Windows...etc) Network technologies โข Switches: Cisco, HPE, Comware, Aruba OS, Arista, Alcatel, Juniper, Dell โข Routers: Cisco, HPE, Comware, Alcatel, Juniper, Mikrotik โข WiFi Mobility: Aruba OS & Central, Cisco, Meraki, Ubiquity, Mikrotik โข MPLS L2/L3 VPN, MP-BGP, VPLS, SDWAN โข BGP, OSPF, IS-IS, EIGRP routing protocols โข FRR, VyOS, Bird โข VLAN, QinQ, VXLAN, EVPN L2 scalable overlay networks โข ACL, PBR, NAT, QoS, NAS; large-scale DHCP/DNS โข IGMP L2 and PIM L3 multicast โข Secure WiFi planning: controller managed & cloud-managed โข NMS, EMS, FCPAS and OSS/BSS systems - LibreNMS, Zabbix, Nagios, Cacti Some of the most notable certifications I hold are: โข CISSP - ISC2 โข HPE Master Accredited Solution Expert - Network Solutions โข HPE Accredited Solutions Expert - Network Architect โข SUSE Cert. Linux Admin.: SLES In addition to technical skills, I deliver proven business operations experience for: โข Business development planning and acquiring the correct technology โข Project Management โข Team building and management โข RFP preparation Proposal preparation (technical/commercial) โข Pre-sales & Sales Management โข Business development, planning, and acquiring the correct technology โข Project Management โข Team building and management โข RFP preparation Proposal preparation (technical/commercial) โข Pre-sales & Sales Management โข Business partnership establishment and management with leading companies such as HPE, Aruba, Fortinet, Cisco, IBM, Dell, Microsoftโฆ and many more I am an avid learner, enabling me to swiftly adapt to new business environments and new project needs. Excellent communication and interpersonal skills combined with my long experience in team-leading & management enable me to collaborate strongly and work in global project teams with multiple members (in both leading or supporting roles).Encryption
Certified Information Systems Security ProfessionalFirewallHigh Availability and Disaster RecoveryNIST Cybersecurity FrameworkNetwork DesignNetwork ArchitectureSolution ArchitectureCloud ArchitectureCloud SecurityBusiness DevelopmentSystem AdministrationCybersecurity ManagementInformation SecurityVPNNetwork Security - $150 hourly
- 5.0/5
- (289 jobs)
I am a cybersecurity professional with a Master's Degree in Cyber Operations and two years of work experience in cybersecurity research and development at a world-class R&D laboratory. In that job, I gained experience in network traffic analysis, malware analysis, and cryptography. For the past seven years, I have worked as a freelancer, providing content development, course creation, and consulting in cybersecurity and blockchain security. I specialize in development of technical content (blogs, whitepapers, case studies, and courseware) in the field of cybersecurity. I currently hold the Certified Ethical Hacker and Certified Blockchain Security Professional certifications.Encryption
Reverse EngineeringCryptocurrencyBlockchainCryptographyInformation Security - $55 hourly
- 5.0/5
- (45 jobs)
Iโve helped companies get ISO 27001/SOC-2/PCI-DSS/FedRAMP/CMMC certifications and compliance against standards such as NIST and HIPAA. I offer ๐ ๐ข๐ก๐๐ฌ-๐๐๐๐ ๐๐จ๐๐ฅ๐๐ก๐ง๐๐ to my clients against ISO 27001, SOC 2 and PCI-DSS compliance! Are your clients requesting security certifications or compliance against HIPAA, ISO 27001, SOC 2, PCI-DSS, or FedRAMP etc.? Do you want a cost effective solution for achieving and maintaining compliance? Do you want help is filling out the security assessment questionnaires and want someone to respond in a way that you are able to win the deal? Do you want surety/ confirmation that your certification project will be a success and you won't loose money over consultation? If you have already purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, OneTrust Compliance Automatization/Tugboat Logic, SecureFrame, and so on) but donโt have the time and energy to achieve and maintain compliance) Do you want to enhance your company's current security posture? MY PROFILE I have over 10 years of experience and have worked within IT GRC (Governance, Risk, Compliance), internal controls and review assurance roles within financial, telecom, fintech and banking industry. The combination of Information technology, accounting & auditing has molded me into an individual who can perform IS Audits (General Controls, Application Controls, Specialized Audits, IT policy & SOPs), IT risk reviews (Risk Assessments, BCP & DR, Risk Mitigation & Control Design), Ethical Hacking, Functional Reviews & QA (Quality Assurance) Services, IT security consultancy (IS Policy & Implementation under different frameworks i.e. 27001, NIST, COBIT 5, PCI, HiTrust, HIPAA, GDPR, SOC 2, SOX) and pre-implementation & post-implementation project reviews, BRD creation by following industry best practices. I can secure your cloud environment with expertise in AWS and Azure by following security hardening best practices. I have also served as DPO (Data Protection Officer) for various clients to help them conform with GDPR requirements. MY CREDENTIALS - CISSP (Certified Information Systems Security Professional) - USA - CISA (Certified in Information System Audit) - USA - CRISC (Certified in Risk & Information Systems Control) - USA - CGEIT (Certified in Governance of Enterprise IT) - USA - SQL Fundamentals (Oracle) - EH (Ethical Hacker) - Cyber security Fundamentals Certification - Kaspersky - Google Analytics - NSE 5 (Network Security Analyst) Tags: Information Security Analyst Chief Information Security Officer ( CISO ) Information Security Manager SOC Analyst SOC (Security Operations Center) Tools: SIEM, CrowdStrike Falcon, Fortinet, FortiAnalyzer, FortiGate, FortiSIEM, Stellar Cyber, Cylance, Splunk, AWS CloudWatch, Microsoft Defender (Azure), AWS CloudTower, GCPEncryption
Information Security ConsultationInformation SecurityCybersecurity ManagementSecurity Policies & Procedures DocumentationPCICloud Security FrameworkNIST SP 800-53SOC 2HIPAAInformation Security AuditIT General Controls TestingSecurity Operation CenterISO 27001SOC 2 Report - $120 hourly
- 5.0/5
- (40 jobs)
Top Rated Plus DevOps Engineer | Cloud Architect specializing in CI/CD, Kubernetes, and CloudOps on AWS & GCP. I help companies reduce deployment time by 40%, optimize cloud costs by 30%, and enhance security with automated solutions. A seasoned professional with over 18 years of hands-on experience in advanced multiplatform DevOps, system administration, and programming. Expertise in architecting and managing large-scale infrastructure on cloud platforms, implementing CI/CD pipelines, and ensuring network security. Proven ability to deliver high-performance solutions, improve system reliability, and align IT operations with business goals. --- โก Core Competencies โข โ๏ธ Cloud Platforms: AWS, Google Cloud Platform (GCP), Microsoft Azure, Yandex Cloud, DigitalOcean, Alibaba Cloud (AliCloud), Scaleway โข ๐ CI/CD & Automation: Jenkins, GitLab CI, GitHub Actions, Bitbucket Pipelines, CircleCI โข ๐ณ Containerization & Orchestration: Docker, Kubernetes, Helm โข ๐ ๏ธ Configuration Management: Ansible, Puppet, Chef โข ๐๏ธ Infrastructure as Code (IaC): Terraform, CloudFormation โข ๐ Monitoring & Logging: ELK Stack (Elasticsearch, Logstash, Kibana), Prometheus, Grafana, Datadog, New Relic, Icinga2 โข ๐ Networking & Security: VPN, DNS, SSL, Firewalls, Load Balancers (HAProxy, NGINX), SOC2 Compliance โข ๐ป Operating Systems: Linux (Debian, CentOS, Ubuntu), FreeBSD, Windows, Vagrant, VMware โข ๐ Version Control & Collaboration: GitHub, GitLab, Bitbucket, Jira, Slack, Confluence โข ๐๏ธ Databases: PostgreSQL, MySQL, MongoDB, Redis, Memcached โข ๐ป Scripting & Programming Languages: Bash, Python, Ruby, Java, PHP, Node.js โข ๐ธ๏ธ Web Servers & Stacks: Apache, Nginx, LAMP, Node.js, Ruby on Rails, WordPress, Magento โข ๐ Security & Compliance: SOC2, ITIL, ITSM, Drata --- ๐ Additional Skills โข ๐ Cloud Security: IAM, Security Groups, VPC, Encryption (KMS) โข โ๏ธ High Availability & Scalability: Auto-scaling, Load Balancing, Disaster Recovery Planning โข ๐ ๏ธ DevOps Practices: Site Reliability Engineering (SRE), Blue-Green Deployments, Canary Releases โข ๐๏ธ Database Administration: Backup & Recovery, Replication, Performance Tuning โข ๐ฐ Cost Optimization: Cloud Cost Management & Budgeting, Reserved Instances, Spot Instances โข ๐ Certifications: AWS Certified Solutions Architect, Google Professional Cloud Architect, Azure DevOps Engineer Expert --- ๐ฏ Specialization โข โ๏ธ DevOps & Automation: Streamlining software development processes through automation, reducing time-to-market, and improving system resilience. โข โ๏ธ Cloud Architecture: Designing and implementing secure, scalable, and cost-efficient cloud infrastructure across various providers. โข ๐ Networking & Security: Ensuring secure communication and robust network architectures, adhering to best practices in security and compliance (SOC2). ---Encryption
Infrastructure as CodeCloud ArchitectureContinuous IntegrationContinuous DeliveryPrometheusAnsibleTerraformAmazon Web ServicesKubernetesCI/CDDockerDevOpsNetwork MonitoringLinuxGoogle Cloud Platform - $150 hourly
- 4.3/5
- (47 jobs)
##Upwork Expert-Vetted - Top 1% of Talent## AWS architecture and implementation, DevSec(Ops), SDN, Windows/Linux systems administration, ESXi/VMware builds/upgrades, root-cause analysis on infrastructure including networks, enterprise endpoint product test and eval, test case builds. Selective experience working through NIST/CMMC security controls and documentation. Throughout my 15 years I've seen and touched almost everything. Very efficient, communicative and thorough.Encryption
Governance, Risk Management & ComplianceCybersecurity ManagementSolution ArchitectureCloud Engineering ConsultationSystems EngineeringNetwork DesignNetwork SecurityInfrastructure ManagementInformation SecurityVMware AdministrationSecurity EngineeringMicrosoft AzureServer VirtualizationAmazon Web ServicesMicrosoft Active Directory - $100 hourly
- 5.0/5
- (28 jobs)
- ๐ Expert-Vetted - ๐ฉ๐ผโ๐ป 15+ Years of Proven Experience in Cybersecurity, Incident Response, and IT Strategy -๐ ๏ธ Hands-on with tools like SIEM, Docker, and AWS - ๐ Extensive Cross-Industry Experience collaborating with startups, global corporations, and small and large organizations from various industries including SaaS (B2B and B2C), Logistics, Medical Devices and healthcare companies I am Chartered IT Professional, Google Cybersecurity Career Certificate Graduate, EC Council Certified Chief Information Security Officer, Certified Information Systems Security Auditor, Certified ISO 27001 Lead Implementer, Certified ISO 27001 Lead Auditor, OWASP Core Security Belt Certified, OWASP API Security Certified, Certified Identity Governance Expert, Certified Identity and Access Manager, Certified GRC Professional, Certified GRC Auditor, Integrated Data Privacy Professional, Certified Scrum Master, BCG Certified Strategy Consultant, Six Sigma Black Belt Professional, GDPR Certified Data Protection Officer, Certified HIPAA Officer & results driven management consultant with 15 years experience in compliance, data protection, SOC 2, ISO 27001, HDS, C5 and NIS2 Controls Implementation, innovation, design thinking, ideating solutions, process improvement, pricing strategy, data analytics, business process outsource, project management, market research, financial analysis, investment banking, cybersecurity and diagnosing a range of problems, from small businesses to multi-million dollar corporations. I have done past projects with HouseCall MD, Varian Medical Systems, DNX VC, Syntervision, FourthRev and Loggi. Previously I have worked as Engagement Manager at KPMG and Senior Auditor at Grant Thornton, where I took part in several consulting assignments in healthcare and life sciences, logistics, TMT, services, consumer and transportation sectors. I also have vast experience of managing projects from start to inception including projects funded by ADB, UNESCO and WHO. I have also completed more than 15 market research studies in different verticals for determining the market size and overall analysis of target markets. I also have experience of working as Head of Product Design where I led the development teams to identify customer pain-points, develop user needs and solve customer problems by creating products with built-in security features. I also worked on developing customer personas & identifying and recruiting sponsor users for A/B testing of product features and arranging Cognitive walkthroughs for establishing the usability of products. I also applied knowledge of Scrum Framework with sprint planning and delegation of tasks on product development projects for various public and private sector organizations. I managed 10 projects of more than $1 Million in total budget. Other than above, I also have hands on experience with various compliance frameworks including GDPR, HIPAA, PCI DSS, ISO 27001, HITRUST, CCPA and NCSF (NIST Cybersecurity Framework). Key Achievements: โ Successfully led 8 companies through the SOC 2 Type 2 attestation process, meeting stringent requirements and passing all audits in the first attempt. This achievement significantly enhanced their reputation for data privacy and security. โ Guided 4 clients through the rigorous process of achieving ISO 27001 and NIS2 Directive Certificate, ensuring that all security controls and management processes were robust, auditable, and internationally recognized. โ Guided 2 clients through HDS and C5 certifications, ensuring that their security posture was aligned with the requirements of both compliance frameworks. โ Reduced the costs of IT infrastructure maintenance by 5% for 3 consulted clients โ Analyzed business conditions, market/industry trends, competitive influences and demographic factors to identify opportunities of business growth for 5 consulted clients โ Created advanced analytics for both internal and marketing use using Tableau, SQL and other BI tools for 4 consulted clients โ Managed $400 million donor funded projects as PMO and Project Lead โ Performed business process re-engineering for 3 consulted clients โ Consulted as lead revenue data analyst on a team responsible for collecting $60M receivables โ Repeatedly delivered cost reductions through the implementation of Lean principles, improved scheduling via resource loads and volume analysis โ Evaluated and increased operational effectiveness of organizations through the implementation of Continuous Improvement methods and Training/Coaching programs โ Identified opportunities within the client organization for improving productivity and operational efficiencies by installing a system by which the client can measure and realize improvement โ Analyzed existing processes and applied methodologies to eliminate wasted resources and time for 3 consulted clientsEncryption
Medical InformaticsRisk AnalysisSystem SecurityData ProtectionVulnerability AssessmentRansomware MitigationInsurance & Risk ManagementUser AuthenticationLinux System AdministrationInformation SecurityNetwork SecurityISO 27001Amazon Web ServicesSOC 2 ReportPython - $40 hourly
- 5.0/5
- (291 jobs)
I'm an OSCP (Offensive Security Certified Professional), OSWE (Offensive Security Web Expert), CREST CRT, and CEH (Certified Ethical Hacker) certified penetration tester. I can conduct vulnerability assessments and penetration testing for your web applications, mobile applications, and cloud infrastructures. I can also audit the code of your PHP / Python / JS (NodeJS) applications and fix code-level vulnerabilities. My day to day work includes: -- Research on bleeding edge technologies -- PHP/Python/JavaScript development -- Code auditing -- Database management -- APIs development & integration -- AWS services (EC2, SES, SNS, SQS, Route53, S3, Lambda, API gateway) -- Penetration testing -- Data scraping -- and a lot moreEncryption
Network SecuritySecurity TestingNetwork Penetration TestingPHPJavaScriptLaravelPenetration TestingInformation SecurityCloud SecurityWeb App Penetration TestingWeb Application SecurityWebsite SecurityInformation Security AuditLinux System AdministrationAmazon Web Services - $125 hourly
- 4.9/5
- (366 jobs)
๐ฌ๐ผ๐ ๐ณ๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ผ๐๐ฟ ๐๐จ๐ฆ๐๐ก๐๐ฆ๐ฆ, and leave security, privacy, and compliance to me! As the founder of ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐-๐ฐ๐ผ๐ป๐๐๐น๐๐ฎ๐ป๐.๐ฐ๐ผ๐บ I know that in the B2B space, you need Security, Privacy, and Compliance to sell to Enterprises! Let me help you unlock business opportunities and growth (๐ฒmillions) and sell to the likes of Disney, Pfizer, Uber, Siemens, Google, PWC, and so on. Sleep well overnight because you know you are in good hands with the ๐ฅ Upwork virtual CISO, Security, Privacy, and Compliance consultant (1M+ earnings, 20+ years of enterprise experience)! CEO selling to Morgan Stanley: ๐ฅ"The certification is enabling us to strike a deal with a Fortune 100 client." CEO selling to Philips: ๐พ "We have achieved the ISO 27001:2022 certification in record time." CEO selling to Pepsi:๐ "Attila supported the growth of our business into Fortune 100 accounts." COO selling to Fannie Mae:๐ "We achieved a successful SOC 2 Type II attestation with no exception." ๐ญSecuring your business, passing security assessments by clients or prospects, and achieving a security certification ๐จ๐๐ค๐ช๐ก๐ ๐ฃ๐ค๐ฉ ๐๐ ๐ ๐๐ช๐ข๐๐๐ง๐จ๐ค๐ข๐ ๐๐ฃ๐ ๐ฅ๐๐๐ฃ๐๐ช๐ก ๐๐ญ๐๐ง๐๐๐จ๐. ๐ All you need to do is ping me on Upwork, bring your problem, and after a 15-minute scoping call, I will provide you with a detailed Scope of Work, including pricing! Specialized in business-to-business clients, providing ๐ธmoney-back guaranteed๐ธ ISO 27001, SOC 2, GDPR, HIPAA, PCI-DSS, CMMC, and FedRAMP projects and affordable virtual CISO (vCISO) services. ----> If you donโt get certified, all my fees will be refunded! <---- ๐๐ ๐๐ง๐ ๐ ๐๐ค๐ค๐ ๐ข๐๐ฉ๐๐ ๐๐ ๐ฎ๐ค๐ช ๐๐ง๐: ๐ค Want to understand the ๐๐๐ฉ๐ช๐๐ก ๐๐ค๐จ๐ฉ for implementation and maintenance of the security controls? ๐ขBusy developing your product or business and donโt have time and resources to be consumed by compliance efforts and endless meetings, halting your production for months. ๐คAlready purchased a DIY compliance tool (Drata, Vanta, Thoropass/HeyLaika, Sprinto, Tugboat Logic, SecureFrame, Strike Graph, Audit Board, Trust Cloud, and so on) but ๐๐ค๐ฃโ๐ฉ ๐ ๐ฃ๐ค๐ฌ ๐ฉ๐๐ ๐ฃ๐๐ญ๐ฉ ๐จ๐ฉ๐๐ฅ ๐ค๐ง ๐๐ค๐ฃโ๐ฉ ๐๐๐ซ๐ ๐ฉ๐๐ข๐. ๐ขYou quickly need quick security or privacy awareness training, cloud security posture assessment (AWS, GCP, Azure), endpoint security (MS 365 - Intune, Jumpcloud, Google Workspace), or penetration testing? ๐ชFacing challenges with the security and privacy implications of AI products? ๐ชWant continuous access to a certified, creditable security, compliance, and privacy professional to manage your security framework? -> Continous virtual CISO (vCISO / fractional CISO) service with affordable weekly payments! ๐Need world-class, battle-proof security and privacy policies and you need it quickly? These are the ones that have passed audits by KMPG, Deloitte, E&Y, Pepsi, Uber, Verizon, Philips, Facebook, and many others. Working with me, you will: โ Stop struggling with compliance requirements, security questionnaires, or useless document templates. โ Make the first steps on the journey to selling Enterprises โ Receive turnkey, Enterprise-grade security operation framework ensuring long-term effectiveness โ Work with an experienced senior team (architects, pen testers, endpoint engineers, developers, auditors, consultants) that regularly helps clients score Enterprise accounts. My stats are: โ Saved tens of thousands $$$$$ for clients, advising them on the right security tools, solutions, and approach โ #1 in Information Security and IT compliance categories (1M+ earned) โ Supporting all time zones โ Long-term engagements โ Professional certifications (CISA, CISSP, ISO 27001 IA) About the Security Consultants team: QUALITY over QUANTITY is our ethos. Excellent quality, on time, always. We only take on projects when we can deliver outstanding results. The team consists of (only) senior experts in AWS, Azure, GCP DevOps, SecOps, Penetration testing, Google Workspace, MS 365 Intune, AppSec, auditing, and compliance. Professional Integrity: We are strongly committed to moral and ethical principles and values, such as honesty, honor, responsibility, trustworthiness, and objectivity. What we look for in a new client: โ Open-minded, relaxed attitude โ Values integrity & long-term relationships โ Willing to accept advice and guidance (security is a complex niche) Security questionnaire and vendor assessment tools: CyberGRX, Panorays, KY3P (S&P, PWC), RSM, CyberVadis, SIG, SIG Lite, CAIQ, VAS, HECVAT, OneTrust, Graphite Connect, Centrl, Whistic, Process Unity Security/Compliance frameworks: ISO 27001, SOC 2, FedRAMP, NIST 800-53, NIST 800-171, NIST CSF, TISAX, HIPAA, HITRUST CSF, GDPR, NERC, ISO 27017, ISO 27018, CMMC, CMMI, TX-RAMP, StateRAMP, AZ-RAMP, NY DFS 23 / NYCRR Part 500, PCI-DSS, FFIEC, C5, ENISA, Center of Information Security (CIS) CSAT, IRAP, PIPEDA, ISO 42001Encryption
AI CompliancePenetration TestingIT Compliance AuditGovernance, Risk & Compliance SoftwareNIST Cybersecurity FrameworkInformation Security ConsultationGDPRISO 27001SOC 2AI SecuritySOC 2 ReportInformation Security AuditCertified Information Systems Security ProfessionalInformation SecurityCybersecurity Management - $100 hourly
- 5.0/5
- (195 jobs)
I am an experienced android reverse engineer. I have a lot of experience in reversing very many android applications. My main skills: * extract data, code, algorithms, signatures and network addresses from android applications * know very well Smali bytecode * application modification for add, remove, modify functionalities * bypass SSL pinning. Interception, modification and analysis of network traffic * creation of private api for applications * decompilation, debugging, analysis and modification of native android libraries * know arm and x86 assembler * use IDA Pro for the analysis of native libraries * have experience in reverse Unity, Cocos, Kony android apks I will be happy to assist you in the successful implementation of your projects in the shortest possible time. I'm ready to work to work 24/7, full time or part time.Encryption
SSLReverse EngineeringAndroid SDKMobile App DevelopmentAndroid App DevelopmentJavaAndroid Want to browse more freelancers?
Sign up
How it works
1. Post a job
Tell us what you need. Provide as many details as possible, but donโt worry about getting it perfect.
2. Talent comes to you
Get qualified proposals within 24 hours, and meet the candidates youโre excited about. Hire as soon as youโre ready.
3. Collaborate easily
Use Upwork to chat or video call, share files, and track project progress right from the app.
4. Payment simplified
Receive invoices and make payments through Upwork. Only pay for work you authorize.
How do I hire a Encryption Freelancer on Upwork?
You can hire a Encryption Freelancer on Upwork in four simple steps:
- Create a job post tailored to your Encryption Freelancer project scope. Weโll walk you through the process step by step.
- Browse top Encryption Freelancer talent on Upwork and invite them to your project.
- Once the proposals start flowing in, create a shortlist of top Encryption Freelancer profiles and interview.
- Hire the right Encryption Freelancer for your project from Upwork, the worldโs largest work marketplace.
At Upwork, we believe talent staffing should be easy.
How much does it cost to hire a Encryption Freelancer?
Rates charged by Encryption Freelancers on Upwork can vary with a number of factors including experience, location, and market conditions. See hourly rates for in-demand skills on Upwork.
Why hire a Encryption Freelancer on Upwork?
As the worldโs work marketplace, we connect highly-skilled freelance Encryption Freelancers and businesses and help them build trusted, long-term relationships so they can achieve more together. Let us help you build the dream Encryption Freelancer team you need to succeed.
Can I hire a Encryption Freelancer within 24 hours on Upwork?
Depending on availability and the quality of your job post, itโs entirely possible to sign up for Upwork and receive Encryption Freelancer proposals within 24 hours of posting a job description.